vulnerability

SUSE: CVE-2023-5366: SUSE Linux Security Advisory

Severity
5
CVSS
(AV:L/AC:L/Au:S/C:N/I:C/A:N)
Published
Oct 6, 2023
Added
Nov 22, 2023
Modified
Jan 28, 2025

Description

A flaw was found in Open vSwitch that allows ICMPv6 Neighbor Advertisement packets between virtual machines to bypass OpenFlow rules. This issue may allow a local attacker to create specially crafted packets with a modified or spoofed target IP address field that can redirect ICMPv6 traffic to arbitrary IP addresses.

Solution(s)

suse-upgrade-libopenvswitch-2_13-0suse-upgrade-libopenvswitch-2_14-0suse-upgrade-libopenvswitch-3_1-0suse-upgrade-libovn-20_03-0suse-upgrade-libovn-20_06-0suse-upgrade-libovn-23_03-0suse-upgrade-openvswitchsuse-upgrade-openvswitch-develsuse-upgrade-openvswitch-docsuse-upgrade-openvswitch-ipsecsuse-upgrade-openvswitch-pkisuse-upgrade-openvswitch-testsuse-upgrade-openvswitch-vtepsuse-upgrade-openvswitch3suse-upgrade-openvswitch3-develsuse-upgrade-openvswitch3-docsuse-upgrade-openvswitch3-ipsecsuse-upgrade-openvswitch3-pkisuse-upgrade-openvswitch3-testsuse-upgrade-openvswitch3-vtepsuse-upgrade-ovnsuse-upgrade-ovn-centralsuse-upgrade-ovn-develsuse-upgrade-ovn-docsuse-upgrade-ovn-dockersuse-upgrade-ovn-hostsuse-upgrade-ovn-vtepsuse-upgrade-ovn3suse-upgrade-ovn3-centralsuse-upgrade-ovn3-develsuse-upgrade-ovn3-docsuse-upgrade-ovn3-dockersuse-upgrade-ovn3-hostsuse-upgrade-ovn3-vtepsuse-upgrade-python3-ovssuse-upgrade-python3-ovs3
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.